DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ebb20915915b6d16a43bacebad347086609b6c9fecc77429cc53cf6a9f949925.dll
Resource
win7-20220901-en
Target
ebb20915915b6d16a43bacebad347086609b6c9fecc77429cc53cf6a9f949925
Size
228KB
MD5
4f2b8c28bfbf3a9034f5c061fa75ed50
SHA1
6c90c5dce94d5413d63e78075bf4f43ad17d6e9f
SHA256
ebb20915915b6d16a43bacebad347086609b6c9fecc77429cc53cf6a9f949925
SHA512
486987800c9b7704bd8ab5a86053a1cf8b2867166d0c5839c24d301a485b7ad5aa082f82261663fd38f016a0a94845eefbb4afa3efb3b1ab75e588cf5866eb4d
SSDEEP
3072:tDB8FBASHiVRVwPs2DMaEJ39aHwJdMcnS1e+peNfrMZCA83HLIpUpFn:n84SCR8sMfExQubzr0CA83rIpUn
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
HeapDestroy
GetTickCount
lstrcpyA
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
SetStdHandle
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetEnvironmentVariableA
lstrlenW
GetShortPathNameA
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
TerminateProcess
ExitProcess
HeapAlloc
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
RaiseException
HeapFree
GetCommandLineA
RtlUnwind
WaitForSingleObject
ReadFile
InitializeCriticalSection
DisableThreadLibraryCalls
lstrcmpiA
FreeLibrary
FindResourceA
LoadResource
LockResource
GetCurrentProcess
FlushInstructionCache
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
lstrcatA
LoadLibraryA
GetProcAddress
GlobalFree
GlobalAlloc
GlobalLock
GetEnvironmentStrings
GlobalUnlock
SetLastError
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetFileAttributesA
GetLastError
GetEnvironmentStringsW
GetVersionExA
CompareStringW
CompareStringA
CloseHandle
SetFilePointer
CreateFileA
WriteFile
lstrcpynA
FindFirstFileA
FindClose
GetWindowsDirectoryA
GetVersion
Sleep
InterlockedExchange
GetLocalTime
GetCurrentProcessId
wsprintfA
ScreenToClient
GetWindowRect
CopyRect
OffsetRect
DrawTextA
GetDlgCtrlID
GetDlgItemTextA
GetWindowDC
EnumChildWindows
IntersectRect
GetClassNameA
MessageBeep
BeginPaint
EndPaint
SendMessageA
UpdateWindow
GetWindow
SystemParametersInfoA
MapWindowPoints
CreateDialogIndirectParamA
GetWindowPlacement
ClientToScreen
GetSystemMetrics
SetFocus
SetDlgItemTextA
GetParent
InvalidateRect
DialogBoxParamA
GetSystemMenu
RemoveMenu
LoadStringA
AppendMenuA
GetClientRect
GetClassInfoExA
RegisterClassExA
GetWindowTextLengthA
GetWindowTextA
CallWindowProcA
DefWindowProcA
CreateWindowExA
LoadIconA
ShowWindow
SetWindowRgn
IsIconic
DestroyWindow
GetDesktopWindow
EnableWindow
SetCapture
LoadCursorA
SetCursor
ReleaseCapture
SetWindowTextA
IsWindow
GetDC
ReleaseDC
GetWindowLongA
SetWindowLongA
SetWindowPos
MoveWindow
GetDlgItem
GetSysColor
FillRect
CreateCompatibleBitmap
CreateCompatibleDC
GetObjectA
BitBlt
DeleteDC
DeleteMetaFile
GetTextExtentPoint32A
GetStockObject
Rectangle
CreateRectRgn
GetDeviceCaps
CreateFontIndirectA
CreateSolidBrush
DeleteObject
SaveDC
SelectObject
SetBkMode
SetTextColor
TextOutA
RestoreDC
EnumFontFamiliesExA
RegSetValueExA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
StringFromCLSID
CoTaskMemFree
ProgIDFromCLSID
GetErrorInfo
CreateErrorInfo
SetErrorInfo
SysReAllocStringLen
SysStringLen
SysAllocStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
sndPlaySoundA
mciSendCommandA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE